Re: BIND ignores changes in zonefiles
Thank you all. It was as some of you suggested. There were two instances of bind running. One answering the queries, the ohterone listening on the controllchannel. After killing both and starting bind again, all works well. Thank you Greetings, Marian -- Marian Roess ___ Please visit https://lists.isc.org/mailman/listinfo/bind-users to unsubscribe from this list bind-users mailing list bind-users@lists.isc.org https://lists.isc.org/mailman/listinfo/bind-users
limiting number of requests of a single hosts
We have a problem with one of our firewalls caused by DNS peaks. Once or twice a day a DNS burst (20K requests/15sec) kills all connections on the firewall. The firewall is due for replacement but in the mean time we would like to stop these peaks at their origin or at least try to limit their impact. We have 6 dns servers (bind) on our campus, that are all authoritative for our domains and also resolver for our campus hosts. Most of our clients however use our AD/LDAP/DNS Microsoft servers as their resolver, which on their turn contact our 6 dns servers for further resolving. What we figured out by packet capturing, is that at a certain point in time these AD/LDAP/DNS servers start 'collecting' dns requests without sending them further and then in a burt pass them on to our 6 dns servers which try to resolve these queries. Due to the fact that one request of a client mostly results in several queries of our dns servers to the outside world (root server contact, NS record resolving,..) , this results in a burst of dns requests through our firewalls, killing them. I have 2 questions, one, is there a way to rate-limit the amount of request a single client (the AD servers in this case) can have standing out against a bind server ? Kind of rate-limiting parameter for bind name server. Two, has anyone already seen this type of behavior on a Microsoft AD/LDAP/DNS server and has a clue what could cause this stalling ? Solving that would be the best solution. Thanks in advance for any suggestion, answer, Wim Holemans Netwerkdienst Universiteit Antwerpen Network Services University of Antwerp ___ Please visit https://lists.isc.org/mailman/listinfo/bind-users to unsubscribe from this list bind-users mailing list bind-users@lists.isc.org https://lists.isc.org/mailman/listinfo/bind-users
Re: ADB messages
On 17/11/11 19:28, Binu B Nair wrote: > Hello, > > I am getting the following informational messages on starting named after > installing bind 9.8.1-P1 on a set of resolvers. Please advise. > > 18-Nov-2011 03:35:14.872 database: info: adb: grow_entries to 1531 starting > 18-Nov-2011 03:35:14.874 database: info: adb: grow_entries finished It's a potential resource bottleneck being tuned upwards (based on current usage). This is to improve performance. It's this change that went into 9.8.0: 2993. [func] Dynamically grow adb hash tables. [RT #21186] ___ Please visit https://lists.isc.org/mailman/listinfo/bind-users to unsubscribe from this list bind-users mailing list bind-users@lists.isc.org https://lists.isc.org/mailman/listinfo/bind-users
Several (>2) different views
On 15 Jun 2012, at 01:14, Rodrigo Renie Braga wrote: > I've been trying to find examples on how to use TSIG to replicate several > differents views to a slave server, but I could only find with two views, and > I just couldn't figure out how to adapt that example to 3 or more views. > > Could you send me example on how to accomplish that? Something like what follows below may be what you need. This supports 3 views, keyed on TSIG or by default on client address. For more views, no new ideas are needed. include "/etc/select-tsig.keys";// keep keys in protected file acl captive-clients { // Purpose: triage for "captive" view key select-captive.ucd.ie.; // select on this key ! key select-internal.ucd.ie.;// by-pass ! key select-general.ucd.ie.; // by-pass 10.137.0.0/16;// Target networks 10.193.128.0/19; 10.193.160.0/20; }; acl internal-clients { // Purpose: triage for "internal" view key select-internal.ucd.ie.; // select on this key ! key select-captive.ucd.ie.; // by-pass (redundant) ! key select-general.ucd.ie.; // by-pass localhost; 172.16.0.0/16;// Special networks 10.224.0.0/16; }; // Clients not otherwise selected are offered "general" view // special-purpose view: 'captive' view "captive" { match-clients { captive-clients; }; // view details go here ... }; // End view "captive" view "internal" { match-clients { internal-clients; }; // view details go here ... }; // standard view: 'general' view "general" { match-clients { any; }; // view details go here ... }; I hope this helps. Niall O'Reilly ___ Please visit https://lists.isc.org/mailman/listinfo/bind-users to unsubscribe from this list bind-users mailing list bind-users@lists.isc.org https://lists.isc.org/mailman/listinfo/bind-users
Re: limiting number of requests of a single hosts
Holemans Wim wrote: > > I have 2 questions, one, is there a way to rate-limit the amount of > request a single client (the AD servers in this case) can have standing > out against a bind server ? Kind of rate-limiting parameter for bind > name server. There isn't a way to do this in BIND. If you are running on Linux you might try the iptables hashlimit module, http://www.bortzmeyer.org/rate-limiting-dns-open-resolver.html (The recently announced response rate limiting patch won't work for you since it takes effect too late in the resolution process. http://www.redbarn.org/dns/ratelimits) I'm afraid I don't have an answer to your other question. Tony. -- f.anthony.n.finchhttp://dotat.at/ Plymouth, Northwest Biscay: Southwesterly 5 to 7, occasionally gale 8 in Plymouth. Rough or very rough, occasionally high in west Plymouth. Showers. Good, occasionally poor.___ Please visit https://lists.isc.org/mailman/listinfo/bind-users to unsubscribe from this list bind-users mailing list bind-users@lists.isc.org https://lists.isc.org/mailman/listinfo/bind-users
Re: limiting number of requests of a single hosts
Hello, You may wish to read ISC/BIND's ARM about these settings (i.e., what they do, how they work, what the defaults are, etc): recursive-clients N; tcp-clients M; clients-per-query P; max-clients-per-query R; where N, M, P, and R are numbers appropriate for your environment for each respective option. See BIND v9.x ARM at https://kb.isc.org/category/116/0/10/Software-Products/BIND9/Documentation/ HTH > > From: Holemans Wim >To: "'bind-users@lists.isc.org'" >Sent: Friday, June 15, 2012 4:25 AM >Subject: limiting number of requests of a single hosts > > > >We have a problem with one of our firewalls caused by DNS peaks. Once or twice >a day a DNS burst (20K requests/15sec) kills all connections on the firewall. >The firewall is due for replacement but in the mean time we would like to stop >these peaks at their origin or at least try to limit their impact. > >We have 6 dns servers (bind) on our campus, that are all authoritative for our >domains and also resolver for our campus hosts. >Most of our clients however use our AD/LDAP/DNS Microsoft servers as their >resolver, which on their turn contact our 6 dns servers for further resolving. > >What we figured out by packet capturing, is that at a certain point in time >these AD/LDAP/DNS servers start ‘collecting’ dns requests without sending them >further and then in a burt pass them on to our 6 dns servers which try to >resolve these queries. Due to the fact that one request of a client mostly >results in several queries of our dns servers to the outside world (root >server contact, NS record resolving,..) , this results in a burst of dns >requests through our firewalls, killing them. > >I have 2 questions, one, is there a way to rate-limit the amount of request a >single client (the AD servers in this case) can have standing out against a >bind server ? Kind of rate-limiting parameter for bind name server. >Two, has anyone already seen this type of behavior on a Microsoft AD/LDAP/DNS >server and has a clue what could cause this stalling ? Solving that would be >the best solution. > >Thanks in advance for any suggestion, answer, > >Wim Holemans >Netwerkdienst Universiteit Antwerpen >Network Services University of Antwerp > >___ >Please visit https://lists.isc.org/mailman/listinfo/bind-users to unsubscribe >from this list > >bind-users mailing list >bind-users@lists.isc.org >https://lists.isc.org/mailman/listinfo/bind-users > >___ Please visit https://lists.isc.org/mailman/listinfo/bind-users to unsubscribe from this list bind-users mailing list bind-users@lists.isc.org https://lists.isc.org/mailman/listinfo/bind-users
Re: limiting number of requests of a single hosts
bind-users-bounces+wbrown=e1b@lists.isc.org wrote on 06/15/2012 04:25:16 AM: > We have a problem with one of our firewalls caused by DNS peaks. > Once or twice a day a DNS burst (20K requests/15sec) kills all > connections on the firewall. > The firewall is due for replacement but in the mean time we would > like to stop these peaks at their origin or at least try to limit > their impact. > > We have 6 dns servers (bind) on our campus, that are all > authoritative for our domains and also resolver for our campus hosts. > Most of our clients however use our AD/LDAP/DNS Microsoft servers as > their resolver, which on their turn contact our 6 dns servers for > further resolving. > > What we figured out by packet capturing, is that at a certain point > in time these AD/LDAP/DNS servers start ?collecting? dns requests > without sending them further and then in a burt pass them on to our > 6 dns servers which try to resolve these queries. Due to the fact > that one request of a client mostly results in several queries of > our dns servers to the outside world (root server contact, NS record > resolving,..) , this results in a burst of dns requests through our > firewalls, killing them. > > I have 2 questions, one, is there a way to rate-limit the amount of > request a single client (the AD servers in this case) can have > standing out against a bind server ? Kind of rate-limiting parameter > for bind name server. > Two, has anyone already seen this type of behavior on a Microsoft > AD/LDAP/DNS server and has a clue what could cause this stalling ? > Solving that would be the best solution. Any chance of using network devices (firewalls, intelligent switches) to rate limit connections from the AD/DNS server to the bind server? Is the odd behavior of the AD/DNS server causing issues with the clients making the original request? Have you tried tracking down the original source of the query? Could that be the ultimate source of the traffic burst? It seems unlikely that MSDNS would intentionally hold DNS requests. Have you tried troubleshooting that? Confidentiality Notice: This electronic message and any attachments may contain confidential or privileged information, and is intended only for the individual or entity identified above as the addressee. If you are not the addressee (or the employee or agent responsible to deliver it to the addressee), or if this message has been addressed to you in error, you are hereby notified that you may not copy, forward, disclose or use any part of this message or any attachments. Please notify the sender immediately by return e-mail or telephone and delete this message from your system. ___ Please visit https://lists.isc.org/mailman/listinfo/bind-users to unsubscribe from this list bind-users mailing list bind-users@lists.isc.org https://lists.isc.org/mailman/listinfo/bind-users
RE: limiting number of requests of a single hosts
Wim Holemans Netwerkdienst Universiteit Antwerpen Network Services University of Antwerp One of the problems is that these firewalls are going to be replaced soon and we don't want to spend to much effort in trying to fix what seems an annoying side-effect of something caused by a DNS system. We actually captured dns traffic around our AD server and were we see an average of 500 dns packets/5s in/out in normal conditions, this drops to about 100 for 20 seconds and then rises to 2000 dns packets/5sec causing our resolving servers to send a multiple amount of requests to the outside world killing the firewall. We know changed the settings on the AD server to only use 2 of the resolving servers (which have a max recursive clients implemented) and checked the box, saying that the AD server could do his own lookups if the forwarders are not available. >Any chance of using network devices (firewalls, intelligent switches) to >rate limit connections from the AD/DNS server to the bind server? > >Is the odd behavior of the AD/DNS server causing issues with the clients >making the original request? Have you tried tracking down the original >source of the query? Could that be the ultimate source of the traffic >burst? > >It seems unlikely that MSDNS would intentionally hold DNS requests. Have >you tried troubleshooting that? Confidentiality Notice: This electronic message and any attachments may contain confidential or privileged information, and is intended only for the individual or entity identified above as the addressee. If you are not the addressee (or the employee or agent responsible to deliver it to the addressee), or if this message has been addressed to you in error, you are hereby notified that you may not copy, forward, disclose or use any part of this message or any attachments. Please notify the sender immediately by return e-mail or telephone and delete this message from your system. ___ Please visit https://lists.isc.org/mailman/listinfo/bind-users to unsubscribe from this list bind-users mailing list bind-users@lists.isc.org https://lists.isc.org/mailman/listinfo/bind-users
Re: limiting number of requests of a single hosts
On Fri, Jun 15, 2012 at 9:37 PM, Holemans Wim wrote: > > > Wim Holemans > Netwerkdienst Universiteit Antwerpen > Network Services University of Antwerp > > > One of the problems is that these firewalls are going to be replaced soon and > we don't want to spend to much effort in trying to fix what seems an annoying > side-effect of something caused by a DNS system. You DO realize that DNS is (mostly) UDP packets, and an attacker (or in your case, the ADs) can simply send UDP packet floods to kill your firewall (in your current state), regardless how your DNS server is configured, even when the DNS server is down? -- Fajar ___ Please visit https://lists.isc.org/mailman/listinfo/bind-users to unsubscribe from this list bind-users mailing list bind-users@lists.isc.org https://lists.isc.org/mailman/listinfo/bind-users
RE: limiting number of requests of a single hosts
Yes we know and new firewalls are on their way (already partly installed), but we can't activate them for the moment as we are in an examination period in which we can't make any change to our network as students should be able to take online tests 24/24... Wim Holemans Netwerkdienst Universiteit Antwerpen Network Services University of Antwerp -Original Message- From: Fajar A. Nugraha [mailto:w...@fajar.net] Sent: vrijdag 15 juni 2012 17:02 To: Holemans Wim Cc: bind-users@lists.isc.org Subject: Re: limiting number of requests of a single hosts On Fri, Jun 15, 2012 at 9:37 PM, Holemans Wim wrote: > > > Wim Holemans > Netwerkdienst Universiteit Antwerpen > Network Services University of Antwerp > > > One of the problems is that these firewalls are going to be replaced soon and > we don't want to spend to much effort in trying to fix what seems an annoying > side-effect of something caused by a DNS system. You DO realize that DNS is (mostly) UDP packets, and an attacker (or in your case, the ADs) can simply send UDP packet floods to kill your firewall (in your current state), regardless how your DNS server is configured, even when the DNS server is down? -- Fajar ___ Please visit https://lists.isc.org/mailman/listinfo/bind-users to unsubscribe from this list bind-users mailing list bind-users@lists.isc.org https://lists.isc.org/mailman/listinfo/bind-users
Re: limiting number of requests of a single hosts
You DO realize that DNS is (mostly) UDP packets, and an attacker (or in your case, the ADs) can simply send UDP packet floods to kill your firewall (in your current state), regardless how your DNS server is configured, even when the DNS server is down? Once we had the firewall for DNS, when it get bunk of queries from the suspect addresses, it returns truncating message and indicates the client to use TCP for queries. -- Email/Jabber/Gtalk: pa...@riseup.net Free DNS Hosting with www.DNSbed.com ___ Please visit https://lists.isc.org/mailman/listinfo/bind-users to unsubscribe from this list bind-users mailing list bind-users@lists.isc.org https://lists.isc.org/mailman/listinfo/bind-users
Re: limiting number of requests of a single hosts
On Jun 15, 2012, at 4:25 AM, Holemans Wim wrote: > We have a problem with one of our firewalls caused by DNS peaks. Yes. W > Once or twice a day a DNS burst (20K requests/15sec) kills all connections on > the firewall. > The firewall is due for replacement but in the mean time we would like to > stop these peaks at their origin or at least try to limit their impact. > > We have 6 dns servers (bind) on our campus, that are all authoritative for > our domains and also resolver for our campus hosts. > Most of our clients however use our AD/LDAP/DNS Microsoft servers as their > resolver, which on their turn contact our 6 dns servers for further resolving. > > What we figured out by packet capturing, is that at a certain point in time > these AD/LDAP/DNS servers start ‘collecting’ dns requests without sending > them further and then in a burt pass them on to our 6 dns servers which try > to resolve these queries. Due to the fact that one request of a client mostly > results in several queries of our dns servers to the outside world (root > server contact, NS record resolving,..) , this results in a burst of dns > requests through our firewalls, killing them. > > I have 2 questions, one, is there a way to rate-limit the amount of request > a single client (the AD servers in this case) can have standing out against a > bind server ? Kind of rate-limiting parameter for bind name server. > Two, has anyone already seen this type of behavior on a Microsoft AD/LDAP/DNS > server and has a clue what could cause this stalling ? Solving that would be > the best solution. > > Thanks in advance for any suggestion, answer, > > Wim Holemans > Netwerkdienst Universiteit Antwerpen > Network Services University of Antwerp > > ___ > Please visit https://lists.isc.org/mailman/listinfo/bind-users to unsubscribe > from this list > > bind-users mailing list > bind-users@lists.isc.org > https://lists.isc.org/mailman/listinfo/bind-users -- Curse the dark, or light a match. You decide, it's your dark. -- Valdis Kletnieks ___ Please visit https://lists.isc.org/mailman/listinfo/bind-users to unsubscribe from this list bind-users mailing list bind-users@lists.isc.org https://lists.isc.org/mailman/listinfo/bind-users
Re: limiting number of requests of a single hosts
Hi there, On Fri, 15 Jun 2012, Holemans Wim wrote: ... Once or twice a day a DNS burst (20K requests/15sec) kills all connections on the firewall. Have you disabled firewall connection tracking for DNS requests? We have 6 dns servers (bind) on our campus, that are all authoritative for our domains and also resolver for our campus hosts. Most of our clients however use our AD/LDAP/DNS Microsoft servers as their resolver, which on their turn contact our 6 dns servers for further resolving. Could you simply run BIND resolvers for your clients and as far as possible avoid using the Microsoft services? Two, has anyone already seen this type of behavior on a Microsoft AD/LDAP/DNS server and has a clue what could cause this stalling ? Yes, I've seen it. I suspect dropped packets might be the cause, but I have no hard evidence. My solution was to use BIND instead. :) -- 73, Ged. ___ Please visit https://lists.isc.org/mailman/listinfo/bind-users to unsubscribe from this list bind-users mailing list bind-users@lists.isc.org https://lists.isc.org/mailman/listinfo/bind-users
Re: limiting number of requests of a single hosts
On 15/06/12 16:37, Holemans Wim wrote: > > Wim Holemans > Netwerkdienst Universiteit Antwerpen > Network Services University of Antwerp > > > One of the problems is that these firewalls are going to be replaced soon and > we don't want to spend to much effort in trying to fix what seems an annoying > side-effect of something caused by a DNS system. > We actually captured dns traffic around our AD server and were we see an > average of 500 dns packets/5s in/out in normal conditions, this drops to > about 100 for 20 seconds and then rises to 2000 dns packets/5sec causing our > resolving servers to send a multiple amount of requests to the outside world > killing the firewall. One thing that comes to mind is: have you traced outside the firewall with e.g. wireshark and looked at what precedes the burst? I am thinking maybe the firewall makes a stop in the packet flow that will then trigger the flood? Possibly caused by some table in the firewall being overflowed, maybe even with unrelated traffic. In this case, only one solution is possible. > We know changed the settings on the AD server to only use 2 of the resolving > servers (which have a max recursive clients implemented) and checked the box, > saying that the AD server could do his own lookups if the forwarders are not > available. > > -- Best regards Sten Carlsen No improvements come from shouting: "MALE > BOVINE MANURE!!!" ___ Please visit https://lists.isc.org/mailman/listinfo/bind-users to unsubscribe from this list bind-users mailing list bind-users@lists.isc.org https://lists.isc.org/mailman/listinfo/bind-users